Leonard Nimoy, Spock in 'Star Trek' Series, Dies at 83

Found on Bloomberg on Friday, 27 February 2015
Browse Various

Leonard Nimoy, the actor behind one of pop culture’s most famous and distinctive fictional characters, the half-human, half-alien Mr. Spock in the “Star Trek” television series and films, has died.

“A life is like a garden,” Nimoy said on Twitter on Feb. 23. “Perfect moments can be had, but not preserved, except in memory. LLAP.” The abbreviation stands for “live long and prosper,” a Vulcan greeting.

Good bye.

Firefox 36 swats bugs, adds HTTP2 and gets certifiably serious

Found on The Register on Thursday, 26 February 2015
Browse Internet

Mozilla has outfoxed three critical and six high severity flaws in its latest round of patches for its flagship browser.

The new version of the browser also adds HTTP2 support ®

Google sure quickly dropped it's Spdy protocol.

HSBC bosses apologise for 'unacceptable' practices

Found on BBC News on Wednesday, 25 February 2015
Browse Various

When asked by MPs who was most responsible for the problems in HSBC's Swiss private bank, Mr Flint said: "The individuals most accountable for the data theft and the behaviour that was unacceptable to our standards, was the management in Switzerland.

HSBC has been involved in a range of banking scandals, including foreign exchange manipulation and rigging of international interest rate benchmarks.

So if this is unacceptable and he is sorry for what happened, will HSBC fully comply with officials to determine the amount of tax fraud and pay them, including interest and fines? Or are these again only hollow words?

Why 'Dumb' Feature Phones Could Make a Comeback Around the World

Found on eWEEK on Tuesday, 24 February 2015
Browse Technology

Japan has long been a global leader in mobile phone trends. That's why the most recent mobile sales numbers coming out of Japan are a shock.

For the past two years, smartphone sales have declined. Some 5.3 percent fewer smartphones sold in 2014 than in 2013.

Things will get much more complex, and dumb phones will have a bigger role to play in this new world. Different minorities of users will choose dumb phones over smartphones for different reasons.

For example, most educated smartphone users know that mobile apps often harvest all kinds of personal data. They might read something about Alohar Mobile inventing a system for identifying users based on how they walk.

Maybe not all hope is lost and people will realize that sometimes you just need one thing: making a call. It's so ridiculous to see those smartphone followers who need to tap their phones every few mins to make sure they don't miss anything; and in a conversation, that's simply annoying.

Microsoft Translator now supports Yucatec Maya and Querétaro Otomi languages

Found on Betanews on Monday, 23 February 2015
Browse Various

"Maya and Otomi are indigenous languages from Mexico which are both currently threatened. Although they are still in use, the number of speakers is decreasing and younger people are not speaking them as actively as their elders. The new automatic translation systems will help the Maya and Otomi people safeguard their language and culture for generations to come".

Even if the languages end up fading away from actual use, it should live digitally forever.

Microsoft makes the assumption that machine-translated texts make more sense than they currently do.

SSL-busting code that threatened Lenovo users found in a dozen more apps

Found on Ars Technica on Sunday, 22 February 2015
Browse Various

Combined with the Superfish ad-injecting software preinstalled on some Lenovo computers and three additional applications that came to light shortly after that revelation, there are now 14 known apps that use Komodia technology.

Despite the seriousness of Graham's discovery and the ease other security researchers had in reproducing his results, Superfish CEO Adi Pinhas issued a statement on Friday saying Superfish software posed no security risk.

Over the weekend, the researcher also published findings documenting rootkit technology in Komodia code that allows it to remain hidden from key operating system functions.

A pretty simple solution would be to make it illegal to break encryption without explicitly telling the user; and not hidden somewhere deep in the EULA, but directly with a big warning, including an explanation of the possible problems.

Norton Internet Security antivirus update 'borked Internet Explorer'

Found on The Register on Saturday, 21 February 2015
Browse Software

Aggrieved users who'd thought far enough ahead to install Google Chrome, Mozilla Firefox or any of the other alternatives took to Norton's official forum to vent their spleens.

Tales of woe, heartbreak and downloads of new browsers spread, until about 0400 GMT, at which point a member of Symantec staff posted: "Kindly run manual live update (right click on Norton icon on tray notification area > 'Run live update ')," helpfully adding "Kindly stop using work-arounds.

People use Norton?
People use Internet Explorer?
Norton does not test their software?

The Great SIM Heist

Found on The Intercept on Friday, 20 February 2015
Browse Various

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.

“Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”

On January 17, 2014, President Barack Obama gave a major address on the NSA spying scandal. “The bottom line is that people around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don’t threaten our national security and that we take their privacy concerns into account in our policies and procedures,” he said.

The bottom line is that something has to change drastically because so far, all official statements have been nothing but lies. How much more will it take until other nations consider sanctions because of these attacks, which are, by US definitions, acts of terrorism?

Is email broken?

Found on BBC News on Friday, 20 February 2015
Browse Internet

For many people, email was their first experience of online communication, and seemed at first a magical new way of connecting at work and at home. Now, though, it looks old hat. Teenagers, we are told, are using everything from Snapchat to WhatsApp to communicate and are unlikely to respond if you email them - something I can confirm from personal experience.

Of around 200 emails from outside my organisation, many were from mailing lists I signed up to in the dim and distant past.

Email will survive Facebook, WhatsApp, Twitter and Snapchat and you cannot complain about too many emails if you signed up for them in the first place. The thruth behind such FUD campaigns is caused by the propaganda machinery paid by the social network companies because the hate email. They cannot build profiles of you for making money with you, simply because they don't see the emails you send. That's the total opposite to your WhatsApp or Twitter accounts, where every single action travels through their systems and help profiling you and your contacts.

Lenovo has been selling laptops that come loaded with Superfish 'malware'

Found on Business Insider on Thursday, 19 February 2015
Browse Computer

Computer manufacturer Lenovo is being criticized for selling laptops that come pre-installed with invasive software, which many users are calling malware.

There are reports that Superfish is carrying out what's known as a "man in the middle" attack — impersonating the security certificates of encrypted websites to let it serve up its ads.

Lenovo says it has now "temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues."

Lenovo might have removed Superfish, but reports say that the problematic certificate remains on the system, allowing third parties to carry out MITM attacks. Which is only a matter of time because the Superfish private key and password have been found and are now public. So if you are using a Lenovo laptop, don't rely on the lock icon anymore: check who signed the certificate.